Hi [[ session.user.profile.firstName ]]

Inside the Mind of a Social Engineer

Join Ryan O'Horo, social engineering expert, as he explains what is inside the mind of a Social Engineer, and learn how easily people (in all types of workplaces) can be manipulated into willingly providing your organization's sensitive information to a complete stranger.
Recorded Nov 29 2011 34 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Ryan O'Horo, IOActive
Presentation preview: Inside the Mind of a Social Engineer

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Mobile Devices: Is your organization protected from this newest threat? Recorded: Jan 31 2012 63 mins
    David Baker, VP of Services
    Mobile devices now represent the newest and largest vulnerability in corporate America. Employees are insisting they have these devices while the corporation has a responsibility to its shareholders to ensure that everything that is allowed to access the corporate network is secured. This means everything from the hardware, operating system or any application running on the device. Anything less is unacceptable.

    Have you developed a strategy to combat the security risks that iPhones, Androids, and Blackberry devices pose?

    Join this live webinar to learn:

    - How hackers are using mobile device vulnerabilities to steal valuable information
    - Recommendations to limit the risk of your mobile applications and devices, whether you are developing them or deploying them
    - Strategies to ensure your organization is protected, today and in the future!
  • Inside the Mind of a Social Engineer Recorded: Nov 29 2011 34 mins
    Ryan O'Horo, IOActive
    Join Ryan O'Horo, social engineering expert, as he explains what is inside the mind of a Social Engineer, and learn how easily people (in all types of workplaces) can be manipulated into willingly providing your organization's sensitive information to a complete stranger.
  • Automated Social Engineering Recorded: Sep 29 2011 39 mins
    Mike Ridpath & Matias Brutti
    Since the original conceptualization of computer security, and perhaps even before, social engineering has been in existence. One could say that social engineering began when societies began, whether it was realized or not. It is now time to give some of this work to scripts and applications to make it a little more interesting…
Sponsored by IOActive
We aim to provide information and best practices around security topics facing organizations today. We cover a variety of topics, including PCI compliance, application security, risk management, hacking, social engineering, SDL, SCADA and DNS. Each webcast lasts 30-60 minutes and the format differs slightly with each presentation. Topics presented are targeted at security, compliance and business professionals with an interest in risk management and information security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Inside the Mind of a Social Engineer
  • Live at: Nov 29 2011 6:00 pm
  • Presented by: Ryan O'Horo, IOActive
  • From:
Your email has been sent.
or close